Certified Cyber Security Analyst VS-1160



Similar documents
Certified Cyber Security Analyst VS-1160

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.

Detailed Description about course module wise:

Loophole+ with Ethical Hacking and Penetration Testing

FORBIDDEN - Ethical Hacking Workshop Duration

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

CEH Version8 Course Outline

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Cybercrime in Canadian Criminal Law

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V

CRYPTUS DIPLOMA IN IT SECURITY

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

EC-Council Ethical Hacking and Countermeasures

Course Title: Course Description: Course Key Objective: Fee & Duration:

Introduction to Cyber Security / Information Security

ETHICAL HACKING CYBER SECURITY

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

EC Council Certified Ethical Hacker V8

[CEH]: Ethical Hacking and Countermeasures

Ethical Hacking & Cyber Security Workshop

Certified Cyber Security Expert V Web Application Development

Certified Financial Management Professional VS-1201

Workshop Designed & Powered by TCIL IT, Chandigarh

CYBERTRON NETWORK SOLUTIONS

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

GFSU Certified Cyber Crime Investigator GFSU-CCCI. Training Partner. Important dates for all batches

Digital Forensics: The aftermath of hacking attacks. AHK Committee Meeting April 19 th, 2015 Eng. Jamal Abdulhaq Logos Networking FZ LLC

The Information Security Problem

Cyber Security, Cyber Crimes and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

Certified Human Resources Manager VS-1002

EC-Council. Certified Ethical Hacker. Program Brochure

Certified Project Management Professional VS-1079

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

LINUX / INFORMATION SECURITY

InfoSec Academy Application & Secure Code Track

Professional Penetration Testing Techniques and Vulnerability Assessment ...

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

InfoSec Academy Forensics Track

Course Content: Session 1. Ethics & Hacking

Ed Ferrara, MSIA, CISSP Fox School of Business

Certified Apache CouchDB Professional VS-1045

Research Topics in the National Cyber Security Research Agenda

TUSKEGEE CYBER SECURITY PATH FORWARD

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

How To Get A Computer Hacking Program

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

A Systems Engineering Approach to Developing Cyber Security Professionals

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

CompTIA Security+ (Exam SY0-410)

Master of Science in Information Systems & Security Management. Courses Descriptions

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Cyber Security, Forensics and Cyber Laws

SONDRA SCHNEIDER JOHN NUNES

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Certified MongoDB Professional VS-1058

Jort Kollerie SonicWALL

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Bellevue University Cybersecurity Programs & Courses

The International Certification in IT Security Training Program. fcch. foresec certified computer hacking

Network Security Essentials:

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

Certified Ethical Hacker (CEH)

COB 302 Management Information System (Lesson 8)

Bachelor of Information Technology (Network Security)

Hackers are here. Where are you?

Scene of the Cybercrime Second Edition. Michael Cross

Current Threat Scenario and Recent Attack Trends

BUY ONLINE FROM:

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Build Your Own Security Lab

Promoting Network Security (A Service Provider Perspective)

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Certified Supply Chain Management Professional VS-1204

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Certified Software Quality Assurance Professional VS-1085

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Defending Against Data Beaches: Internal Controls for Cybersecurity

RMAR Technologies Pvt. Ltd.

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Transcription:

VS-1160

Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The certification tests the candidates on various areas in cybercrime, IT Act 2000, cyberoffenses, wireless devices cybercrime, phishing, keyloggers, backdoors, SQL injection, DDoS attacks, identity theft, computer and wireless forensics, cyberterrorism, social media marketing, incident handling and privacy. Why should one take this certification? This Course is intended for professionals and graduates wanting to excel in their chosen areas. It is also well suited for those who are already working and would like to take certification for further career progression. Earning Vskills Cyber Security Analyst Certification can help candidate differentiate in today's competitive job market, broaden their employment opportunities by displaying their advanced skills, and result in higher earning potential. Who will benefit from taking this certification? Job seekers looking to find employment in IT or cyber security departments of various companies, students generally wanting to improve their skill set and make their CV stronger and existing employees looking for a better role can prove their employers the value of their skills through this certification. Test Details Duration: 60 minutes No. of questions: 50 Maximum marks: 50, Passing marks: 25 (50%) There is no negative marking in this module. Fee Structure Rs. 4,500/- (Includes all taxes) Companies that hire Vskills Cyber Security Analyst Cyber Security Analysts are in great demand. Companies specializing in IT or cyber security is constantly hiring skilled Cyber Security Analysts. Various public and private companies also need Cyber Security Analysts for their IT or cyber security departments.

1. Cyber Technology 1.1 Networking 1.2 Wireless LAN Basics 1.3 Web Basics 1.4 Website 1.5 Information Security Principles 1.6 Cryptography 1.7 Public Key Infrastructure 1.8 Electronic Signature 1.9 Access Management 1.10 User Access Management 1.11 Cloud Computing 2. Cyber Ethics 2.1 Privacy 2.2 License, Trademark and Copyright 2.3 Intellectual Property 2.4 Freedom of Speech 2.5 Hacking 2.6 Internet Fraud 3. Cyber Crimes 3.1 Cyber Crimes 3.2 Cyber Criminals Types 3.3 Cyber Crime Motives 3.4 Psychological Profiling 3.5 Sociology of Cyber Criminals 3.6 Social Engineering 3.7 Cyber Stalking 3.8 Botnets 3.9 Attack Vector 3.10 Malware 3.11 Phishing 3.12 Identity Theft (ID Theft) 3.13 Cyber Terrorism 4. Cyber Crime Techniques 4.1 Proxy Servers and Anonymizers 4.2 Password Cracking 4.3 Keyloggers and Spywares 4.4 Worms 4.5 Trojan Horse 4.6 Steganography Table of Contents Certified Cyber Security Analyst

4.7 DoS and DDoS Attacks 4.8 SQL Injection 4.9 Buffer Overflow 4.10 Reverse Engineering 4.11 Vulnerability Research 4.12 Network Attacks 4.13 WLAN Hacking 4.14 Web Server Attacks 4.15 VoIP Hacking & Countermeasures 4.16 SMS Forging 5. Prevention and Protection 5.1 Business Continuity 5.2 Disaster Recovery 5.3 System Backup 5.4 Security Assessments 5.5 Penetration Testing 5.6 Security Testing Tools 5.7 Monitoring 5.8 Intrusion Detection and Prevention 5.9 Vulnerability Assessment (VA) 5.10 Secure Coding 5.11 Incident Management 5.12 Risk Management 6. Cyber Forensics 6.1 Forensic Activities 6.2 Forensic Technologies 6.3 Chain of Custody Concept 6.4 Digital Forensics Life Cycle 6.5 Digital Forensics Tools 6.6 Forensics Analysis of E-Mail 6.7 Network Forensics 6.8 Computer Forensics and Steganography 6.9 Forensics and Social Media 6.10 Mobile Forensics 6.11 Computer Forensic Lab 6.12 Computer Forensic Team 7. Cyber Crime Investigation 7.1 Cyber Crime Investigation Basics 7.2 Pre-Investigation Technical Assessment 7.3 Detection and Containment 7.4 Digital Evidence Collection 7.5 Evidence Preservation 7.6 Evidentiary Reporting

7.7 Investigating Phishing Cases 7.8 Investigating Cyber Pornography Crimes 7.9 Investigating Credit Card Fraud Cases 8. Cyber Law 8.1 IT Act 8.2 International Cyberspace Laws 8.3 Other Law and Policy Agencies

Sample Questions Certified Cyber Security Analyst 1. Computer forensics involves all of the following stated activities except A. Interpretation of computer data B. Manipulation of computer data C. Extraction of computer data 2. A set of instructions compiled into a program that performs a particular task is known as A. Central processing unit B. Software C. Hardware 3. The smallest addressable unit of data by a HDD generally consists of A. 64K B. 8 bits C. 512 bytes 4. A drive is prepared in three processes. The processes include all of the following except A. High-level formatting B. Low-level formatting C. Partitioning 5. Areas of files and disks that are not apparent to the user, and sometimes not even to the operating system, is termed as A. Latent data B. Hidden data C. Missing data Answers: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)